Company: iGATE Global Solutions Limited
Gate Model Exam Paper(CS)
 Find the Fourier sine transform off f(x), where
 Nullity of the matrix is
 The proposition n of is
 If A and B be sets and A^{c} and B^{c} denote the complements of the sets, A and B, then set (AB) (BA) (A B) Is equal to
 Let G=G(V,E) has five vertices, then what is the maximum number of m of edges in E, if G is a multi graph?
 How many straight lines can be drawn through 10 points on a circle?
 Which of these does not over run the server when the number of clients rises?
 Which of these does not require closing?
 The cyclomatic complexity of each of the modules A and B shown below is 10. What is the cyclomatic complexity of the sequential integration shown on the right hand side
 Which of these is not a software process model?
 The building blocks of CASE are
 A cohesive module performs a single task within a software procedure, requiring little interaction with other procedures.
 What does the following program print?
 Which of these correct in C?
 How to remove security concerns caused by dynamic linking?
 What is the value of j and k after the execution of following code fragment?
 How many keywords are there in the following code fragment printf(“i=%d” ,i)?
 What is the height of the binary tree
 In SQL, relations can contain null values and comparisons with null values are treated as unknown. Suppose all comparisons with a null value are treated as false. Which of the following pair is equivalent?
 From the following instance of a relation schema R(A, B, C), we can conclude that


 In the index allocation scheme of blocks to a life, the maximum possible size of the file does not depend on
 Which of these are error correcting codes?
 Which of these fields doesn’t come in FDDI frame format?
 The following functional dependencies hold for relations R(A, B, C) and S(B, D, E)
 Binary trees are preferred to B^{+} trees in databases
 With regard to the expressive power of the formal relational query languages, which of the following statements is false?

Given P(A )= and P(A B)= then P(B) is
 If u+iv is an analytic function, then v+iu will be
 If product of matrix
 The value of in the mean value theorm of
 If , then a constant k, k equals
 Complementary function of
 The maximum slope of the curve
 The solution of the differential equation

Consider the following code fragment:
 Consider the following C function
 Consider the grammar :
 Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48bit jamming signal is 46.6µs.The maximum frame size is
 Which of the following layers doesn’t come in TCP/IP model?

Let G be a simple graph with 20 vertices and 100 edges. The size of the minimum vertex cover of G is 8. Then, the size of the maximum independent set of G is
 Consider the following program segment for a hypothetical CPU having three user register R_{1}, R_{2},and R_{3}:
 In a M×N matrix such that all nonzero entries are covered in row a and b columns. Then the maximum number of nonzero entries, such that no two are on the same row or column, is
 Suppose T(n) =2t(n/2) +nT (0) =T(1) =1
 The goal of structured programming is to
 The tightest lower bound on the number of comparisons, in the worst ease, for comparisonbased sorting is of the order of
 Consider a relation schema R = (A, B, C, D, E, H) on which the following functional dependences hold:
 If 73x( in basex number system)nis equal to 54y( in basey number system), the possible values of x and y are
 Consider the languages:

 Consider the Grammar:

Consider the grammar with the following translation rules and E as the start symbol

 Let A be a sequence of distinct integers sorted in ascending order. How many distinct pairs of sequences B and C there such that (1) each sorted in ascending order (2) B has 5 and C has 3 elements, (3) the result of merging B and C gives A?
 The problem 3SAT and 2Sat are
 Which one of the following are essential features of an objectoriented programming language?
 Assume the following C variable declaration
 Given the following input (4322 1334,1471,9679, 1989, 6171, 6173, 4199) and the hash function xmod 10, Which of the following statements are true?
 Let f:B C and g:A B be two functions and let h=fog. Given that h is an onto function. Which one of the following is true?
 In a population of N families,50% of the families have three children, 30% of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children?
 Which one of the following is not shared by the threads of the same process?
 A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?

A software organization has been assessed at SEI CMM level 4.Which of the following does the organization need to practice beside process Change management and Technology Change Management in order to achieve level 5
 Suppose two parties A and B wish to setup a common secret key (DH key) between themselves using the DiffleHellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their DH key is
 We have two designs D_{1} and D_{2} for a synchronous pipeline processor. D_{1} has 5 pipeline stage with execution times of 3ns, 2ns, and 3,ns while the design D_{2} has 8 pipeline stages each with 2ns execution time. How much time can be saved using design D_{2} over design D_{1} for execution 100 instructions?
 Which of the following statements is false regarding a bridge?

What is the availability of software with the following reliability figures?
 Ina particular Unix OS, each data block is of size 1024 byte, each node has 10 direct data block addresses and three additional addressesone for single indirect block, one for double indirect block and one for triple indirect block. Also each block can contain addresses for 128 blocks. Which one of the following is approximately the maximum size of a file in the file system?
 On a TCP connection, current congestion window size is congestion Window =4kbyte. The window size advertised by the receiver is Advertise Window=6 Kbyte. The last byte sent by the sender is last byte sent =10240 and the last byte acknowledged by the receiver is last byte asked =8192. The current window size at the sender is

How many pulses are needed to change the content of a 8bit up counter from 10101100 to 00100111 (rightmost bit is the LSB)?
 Which of these is worst routing algorithm in case of congestion?
 What is the size of checksum in byte in token ring MAC sub layer protocol
 What is inorder traversal of the tree which is shown as preorder traversal here 10, 70, 50, 60, 30, 40, 90, 20, 80?
 A hash table of length 10 uses open addressing with hash function h(k)=k mod 10 and linear probing. After inserting 5 values into a empty hash table, the table is as shown below

 Match List 1 with list 2 and select the correct answer using the codes given below the lists

Which of the following options is closest in meaning to the word given below?
 The question below consists of a pair of related words followed by four pair of words. Select the pair which best expresses the relation in the original pair
 Choose the most appropriate word for the options given below to complete the following sentence.
 Choose the most appropriate word for the options given below to complete the following sentence.
 The price per kg of rice increases by 20 %. By what percentage should the consumption be decreased such that expenditure remains the same?
 One state adds 7% sales tax to the price of most purchased within its jurisdiction. This tax therefore, if viewed as tax on income, has the reverse effect of the federal income tax, the lower the income, the higher the annual percentage rate at which the income is taxed
 A man invests a certain amount of money at 6 % pa simple interest and another sum at 7% pa simple interest. His income from interest after 2 year was Rs354. One fourth of the first sum is equal to Onefifth of the second sum. The total sum invested was
 Mr Rachel buys some apples at 5 per rupee from one trader, and a similar quantity at 7 per rupee from a different trader. He mixes both the varieties and sells the entire lot at 6 per rupee. What is the profit or loss % that he makes
 A man starts from B to k, another man starts from K to B at the same time. After passing each either they complete their journey in 3 and 4 h respectively. Find the speed of the second man if the speed of the first is 12km/h
 A and B working separately can do a piece of work in 9 and 12 days respectively. If they work for a day alternatively. A beginning, in how many days the work will be completed
(c) (1cos as) (d) None of these
(a) 1(b) 2
(c) 3(d) 4
(a) A tautology
(b) A contradiction
(c) Logically equivalent to
(d) None of the above
(a) A B (b) A^{c} B^{c}
(c) A B (d) A^{c} B^{c}
(a) 5(b) 2
(c) 10(d) Finite or infinite
(a) 10(b) 20
(c) 45(d) infinite
1. CGI2. JSP
(a) 1 only (b) 2 only
(c) Both (a) and (b) (d) None of these
(a) <h1>(b) <br>
(c) <body> (d) <html>
(a) 30(b) 31
(c) 33(d) 28
(a) RAD(b) WINWIN spiral
(c) Prototyping(d) Recurrent
1. CASE tools
2. Hardware platform
3. Operating system
4. Environment architecture
5. Integration framework
6. Portability services
(a) 1,2,3,4,5,6 (b) 1,3,4,2,5,6
(c) 1,2,5,6,3,4(d) 4,2,3,6,5,1
The correct order from least required cohesion to most required cohesion from these cohesion types is
1. Coincidentally
2. Temporal
3. Logically
4. Communicational
(a)1,2,3,4 (b) 1,3,2,4
(C) 3,2,1,4(d)4,2,1,3
void f(int *p, int* g){
int i=1, j=0;
int main(){
f(&i, &j);
printf(“%d %dn”, i, j);
return 0;
(a) 2 2(b) 2 1(c) 0 1(d) 1 2
(a) P_{1} (b) P_{2}(c) P_{3}(d) P_{4}
(a) By incorporating cryptographic procedures in C
(b) By using secure linking
(c) By making security static
(d) By making search path for libraries known somehow at runtime
j =0
k=j++ + ++j+ ++ j + j++ + ++j+ j++
(a) 4, 12(b) 4, 15
(c) 3, 15(d) 4, 18
(a) 12(b) 10
(c) 8(d) 7
45, 12, 15, 34, 56, 70, 54?
(a) 3(b) 2
(c) 4(d) 5
(a) x=5; not (not (x=5)
(b) x=5; x>4, where x is an integer
(c) x≠5; not (x=5)
(d) None of the above






(a) A functionally determine B and B functionally determine C
(b) A functionally determine B and B does not functionally determine C
(c) B does not functionally determine C
(d) A does not functionally determine b and B does not functionally determine C
(a) The size of the blocks
(b) The number of blocks used for the index
(c) The size of the address of the blocks
(d) The level of indices
1. Parity2. Hamming code
3. CRC code
(a) 1, 2, 3(b) 1, 2
(c) 1, 3(d) 2, 3
(a) Preamble(b) Destination address
(c) Source address(d) Access control
The relation R contains 300 tuples and the relation S contains 100 tuples. What is the maximum number of tuples possible in the natural join RS?
(a) 100(b) 200
(c) 300(d0 3000
(a) when data is transferred in blocks
(b) when data is transferred in individual blocks
(c) when disk capacities are more than memory capacities
(d) when disks are more reliable than memory
(a) Relational algebra is less powerful than relational calculus
(b) Relational algebra doesn’t have the same power as relational calculus
(c) Relational algebra doesn’t have the same power as safe relational calculus
(d) None of the above
2 marks Questions
(a) 2/3(b) 1/5
(c) 1/3(d) 4/5
(a) always analytic’
(b) Analytic only ifu= constant
(c) Analytic only ifv= constant
(d) Analytic only if both u and v are constants
A= and
B=
is a null matrix, then and differ by an
(a) Odd multiple of
(b) Even multiple of
(c) Odd multiple of
(d) Even multiple of
F(b)f(a)=(ba)f’(
For f(x) A=x^{2 }+ Bx + Cin (a,b) is
(a) b+a(b) ba
(c) (d)
(a) 1(b) 0
(c) f(k)f(0)(d) f(x+k)f(x)
is
(a) c_{1}x+c_{2}(b) c_{1=x}^{2} +c_{3}
(c) c_{1}x^{1}+c_{2}x^{2}(d) c_{1}x^{2} +c_{1}x
(a) 14(b) 16
(c) 19(d) 13
is given by
(a)
(b)
(c) =x^{2}c
(d)
If (fork( ) = =0)
{a=a+5;printf(“%d, %d/n”, a and a);}
else {a5;printf(“%d,%d/n”, a, & a);}
let u, v be the values printed by the parent process, and x, y be the values printed by the child process,which one of the following is true?
(a) u=x+10 and v=y
(b) u=x=10 and v≠y
(c) u+10=x and v=y
(d) u+10=x and v≠y
int f(int n)
{static int i=1;
If (n>=5) return n:
n= n+i;
return f(n);
The value returned by f(1) is
(a) 5(b) 6
(c) 7(d) 8
Let the number of states in SLR (1), LR(1), and LALR(1) parses for the grammar be n_{1}, n_{2}, and n_{3} respectively, which of the following holds good?
(a) n_{1 }< n_{2 }< n_{3}(b) n_{1} = n_{3} <n_{2}
(c) n_{1} =n_{2} =n_{3}(d) n_{1 }≥ n_{3} ≥ n_{2}
(a) 94(b) 416
(c) 464(d) 512
(a) Application(b) Transport
(c) Internet(d) Data link
(a) 12(b) 8
(c) less than 8(d) more than 12


Instruction size(in words) 
MOV R_{1}, 5000 
; R_{1 }Memory [5000] 

MOV R_{2}, (R_{1}) 
; R_{2 }Memory [(R_{1})] 

ADD R_{2}, R_{3} 
: R_{2 }R_{2} +R_{3} 

MOV 6000, R_{2} 
: Memory[6000]R_{2} 


: Machine halts 

Consider that the memory is byte addressable with size 32 bit and program has been loaded starting from memory location 1000(decimal). If an interrupt occurs while the CPU has been halted after executing the HALT instruction, the return address (in decimal) saved in the stack will be
(a) 1007(b) 1020
(c) 1024(d) 1028
(a) ≤ a+b(b)≤ MAX{A,B}
(c) ≤ min {M –a, N –b}(d)≤ min {a, b}
Which one of the following is false?
(a) T(n) = O(n_{2}) (b) T(n) = (n log n)
(c) T(n) = (n_{2}) (d) T(n) = O(n log n)
(a) have well indented programs
(b) be able to infer the flow of control from the compiled code
(c) be able to infer the flow of control from the program text
(d) avoid the use of GOTO statements
(a) n(b) n^{2}
(c) n log n(d) n log^{2} n
(A>B, BC> D, E>C, D>A), what are the candidate keys of R?
(a) AE,BE(b) AE, BE, DE
(c) AEH, BEH, BCH (d) AEH, BEH, DEH
(a) 8, 16(b) 10, 12
(c) 9, 13(d) 8, 11
L_{1}=(wwRw {0, 1}*}
L_{2}={w#wRw {0,1}*}where # is a special symbol
L_{3}= {ww w {0,1}*}
Which one of the following is true?
(a) L_{1} is a deterministic CFL
(b) L_{2} is a deterministic CFL
(d) L_{3} is a deterministic CFL
E E+n E n n
For a sentence n + n n, the handles in the right sensential form of the reduction are
(a) n, E+ n and E+ n n
(b) n, E+ n and E+ E n
(c) n, E+ n and n+ n n
(d) n, E+ n and E n
Fnum {F.value=num.value}
Compute E.value for the root of the parser tree for the expression: 2# 3 & 5 # 6 & 4.
(a) 200(b) 180
(c) 160(d) 40
(a) 2(b) 30
(c) 56(d) 256
(a) Both in P
(b) Both NPcomplete
(c) NPcomplete and in P respectively
(d) undecidable and NPcomplete respectively
(a) Abstraction and encapsulation
(b) strictlytypedness
(c)Typesafe properly coupled with subtype rule
(d) Polymorphism in the pressure of inheritance
Int *A[10], B[10][10];
Of the following expressions
1. A[2] 2. A[2][3]3. B[1]4. B[2][3]
Which will not give compiletime errors is used as left hand sides of assignment statements in a C program?
(a) 1, 2 and 4(b) 2, 3 and 4
(c) 2 and 4(d) 4 only
1. 9679, 1989, 4199 hash to the same value
2. 1471, 6171, hash to the same value
3. all elements hash to the same value
4. Each element hashes to a different value
(a) 1 only(b) 2 only
(c) 1 and 2 (d) 3 or 4
(a) f and g should both be onto functions
(b) f should be onto and g needs not be onto
(c) g should be onto and f needs not be onto
(d) both f and g need not be onto
(a) 3/23(b) 6/23
(c) 3/10(d) 3/5
(a) Stack(b) Address space
(c) File descriptor table(d) Message queue
(a) 14(b) 30
(c) 62(d) 126
(a) Defect detection(b) Defect prevention
(c) Defect isolation(d) Defect propagation
(a) 3(b) 4
(c) 5(d) 6
(a) 214ns(b) 202ns
(c) 86ns(d) 200ns
(a) Bridge is a layer 2 device
(b) Bridge reduces collision domain
(c) Bridge is used to connect two or more LAN segments
(d) Bridge reduces broadcast domain
Mean Time Between Failure (MTBF) = 25 days
Mean Time To Repair (MTTR) = 6 h
(a) 1% (b) 24%
(c) 99%(d) 99.009%
(a) 512Mbyte(b) 2 Gbyte
(c) 8 Gbyte(d) 16 Gbyte
(a) 2048 byte(b) 4096 byte
(c) 6144 byte(d) 8192 byte
(a) 134(b) 133
(c) 124(d) 123
(a) Flooding(b) Distance vector
(c) Link state(d) Flow based
(a) 1(b) 2
(c) 3(d) 4
(a) 10, 20. 30. 40. 50. 60. 70. 80. 90
(b) 20, 30, 50, 60, 90, 10, 40, 80, 70
(c) 20, 50, 80, 90, 10, 30, 60, 40, 70
(d) 70, 50, 90, 30, 10, 20, 40, 60, 80




















Which one of the following choices gives a possible order in which the key values could have been inserted in the table?
(a) 12, 24, 54, 35, 10(b) 54, 35, 24, 10, 12
(c) 12, 10, 35, 54, 24(d) 10, 12, 35, 24, 54
List 1 
List 2 
A. Token bus B. DQDB C. Ethernet D. Token ring 
1. 802.3 2. 802.4 3. 802.5 4. 802.6

(a) A(2), B(3), C(4), D(1)
(b) A(3), B(1), C(4), D(2)
(c) A(1), B(2), C(3), D(4)
(d) A(4), B(3), C(1), D(2)
General Aptitude
(a) Unrefined(b) Tasteless
(c) Inelegant(d) Graceful
Die : Dice
(a) data : Datas(b) Mouse : Mice
(c) Monkey : Monkies(d) Dates : Datum
Congress is having great difficulty developing a consensus on energy policy, primarily because the policy objectives of various members of Congress rest on such……… assumptions
(a) common place(b) trivial
(c) explicit(d) divergent
Because folk art is neither completely rejected nor accepted as an art form by art historians, their final evaluations of it necessarily remain ………
(a) Arbitrary(b) equivocal
(c) Orthodox(d) unspoken
(a) 20% (b) 16.67%
(c) 25%(d) 16.33%
The conclusion above would be properly drawn if which of the following were assumed as a premise?
(a) The amount of money citizens spend on products subject to the state tax tends to be equal across income levels
(b) The federal income tax favours citizens with high incomes, whereas the state sales
tax favours citizens with low incomes.
(c) Citizens with low annual incomes can afford to pay a relatively higher percentage
of their incomes in state sales tax, since their federal income tax is relatively low
(d) The lower a state’s sales tax, the income it will tend to redistribute income from
the more affluent citizens to the rest of the society
(a) Rs 2600(b) Rs 2700
(c) Rs 2880(d) Rs 2900
(a) 2 % (b) 3 %
(c) 3 % (d) 2 %
(a) 8 km/h(b) 10km/h
(c) 15 km/h(d) 24 km/h
(a) 7 days (b) 9 days
(c) 10 days (d) 12 days
1. (c)2. (b)3. (b)4. (c)5. (d)6. (c)
7. (a)8. (b)9. (d) 10. (d)11. (d)12. (b)
13. (d)14. (a)15. (a)16. (d)17. (a)18. (a)
19. (a)20. (a)21. (d)22. (b)23. (d)24. (a)
25. (a)26. (c)27. (c)28. (d)29. (c)30. (c)
31. (b)32. (c)33. (a)34. (b)35. (b)36. (c)
37. (b)38. (c)39. (d)40. (a)41. (a)42. (a)
43. (b)44. (c)45. (b)46. (d)47. (d)48. (b)
49. (d)50. (c)51. (d)52. (c)53. (b)54. (d)
55. (c)56. (b)57. (b)58. (a)59. (c)60. (b)
61. (c)62. (a)63. (d)64. (b)65. (d)66. (b)
67. (b)68. (a) 69. (d)70. (a)71. (a)72. (b)
73. (d)74. (b)75. (d)76. (b)77. (b)78. (a)
79. (b)80. (a)81. (b)82. (c)